Adding minimum permissions to your workflows help keep your repository safe against supply-chain attacks. I see the repo only uses one workflow test.yml for testing and this workflow just needs contents: read permission to run actions/checkout. If you agree with these changes, I can open a PR!
Adding minimum permissions to your workflows help keep your repository safe against supply-chain attacks. I see the repo only uses one workflow
test.yml
for testing and this workflow just needscontents: read
permission to runactions/checkout
. If you agree with these changes, I can open a PR!This is considered good-practice and recommended by GitHub itself and other security tools, such as Scorecards and StepSecurity.
Additional context
I'm Gabriela and I work on behalf of Google and the OpenSSF suggesting supply-chain security changes :)